Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544635
Nasrin Aasofwala, Shanti Verma, Kalyani Patel
Deaf Culture is important for deaf community as it is everywhere in the world. Deaf people are using Visual language (Sign language) for communicating. There are around 300 different types of sign languages are available in the globe like British Sign Language, Indonesian Sign Language, American sign language, etc. Each sign language has its own syntax and semantics. Some sign languages are using one hand gesture, some are using two hand gesture as they have their own rules for communication. There is a need of one standard form of sign language so it will be easier to understand. There are so many challenges and problems are facing by deaf community. Different sign languages are provided different solutions for speech to sign language and sign language to speech conversion. As there is no solution is provided by anyone for Gujarati Sign Language, we proposed a one communication model for Speech to Sign language. Speech will be recognized and convert into text, text will give the HamNoSys Notation (Sign language Notation) from a database and then it converts in SiGML format and then it display a sign animation (Avatar). That model will be helpful to Gujarat region deaf and dumb people for communicating with normal people.
{"title":"A Novel Speech to Sign Communication Model for Gujarati Language","authors":"Nasrin Aasofwala, Shanti Verma, Kalyani Patel","doi":"10.1109/ICIRCA51532.2021.9544635","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544635","url":null,"abstract":"Deaf Culture is important for deaf community as it is everywhere in the world. Deaf people are using Visual language (Sign language) for communicating. There are around 300 different types of sign languages are available in the globe like British Sign Language, Indonesian Sign Language, American sign language, etc. Each sign language has its own syntax and semantics. Some sign languages are using one hand gesture, some are using two hand gesture as they have their own rules for communication. There is a need of one standard form of sign language so it will be easier to understand. There are so many challenges and problems are facing by deaf community. Different sign languages are provided different solutions for speech to sign language and sign language to speech conversion. As there is no solution is provided by anyone for Gujarati Sign Language, we proposed a one communication model for Speech to Sign language. Speech will be recognized and convert into text, text will give the HamNoSys Notation (Sign language Notation) from a database and then it converts in SiGML format and then it display a sign animation (Avatar). That model will be helpful to Gujarat region deaf and dumb people for communicating with normal people.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129027239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suicide is the 2nd leading cause of death in the world, for those aged 15-24 and about 800,000 victims of suicide yearly (all age), which is about 40 per second. Behavioural health disorder, explicitly depression, are the type of health concerns, not many are aware of. There is no way one can get treatment of something they are not aware of. So, classifying potential health disordered person is the first step towards prevention. Lifestyle is something which defines individual the best. Lifestyle including Income, age group, martial status, child, property owned, alcohol or tobacco consumption, medical expenditure, insurance or other type of investment and many more. Using 76 such kind of attributes, model will predict if the individual is victim of depression or not. The proposed model has used eight mainstream ML calculation methods, namely (Decision tree (DT), Random Forest(RF), Support Vector Machine(SVM), Naïve Bayes(NB), Logistic Regression(LR), XGBoost(XGB), Gradient Boosting Classifier(GBC) and Artificial Neural Network(ANN) to build up the expectation models utilizing a huge dataset (1429 individual's survey), bringing about precise and productive dynamics. By using various strategies and different model, this research work has attempted to get a clear and precise picture. The reason to follow various approaches is that, precise the information, work in a better way and reduce the number of suicide case. The final outcome received was 87.38 percent, which was using Support Vector Machine (SVM).
{"title":"Machine Learning Techniques for Prediction of Mental Health","authors":"Tarun Jain, Ashish Jain, Priyank Singh Hada, Horesh Kumar, V. Verma, Aayush Patni","doi":"10.1109/ICIRCA51532.2021.9545061","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9545061","url":null,"abstract":"Suicide is the 2nd leading cause of death in the world, for those aged 15-24 and about 800,000 victims of suicide yearly (all age), which is about 40 per second. Behavioural health disorder, explicitly depression, are the type of health concerns, not many are aware of. There is no way one can get treatment of something they are not aware of. So, classifying potential health disordered person is the first step towards prevention. Lifestyle is something which defines individual the best. Lifestyle including Income, age group, martial status, child, property owned, alcohol or tobacco consumption, medical expenditure, insurance or other type of investment and many more. Using 76 such kind of attributes, model will predict if the individual is victim of depression or not. The proposed model has used eight mainstream ML calculation methods, namely (Decision tree (DT), Random Forest(RF), Support Vector Machine(SVM), Naïve Bayes(NB), Logistic Regression(LR), XGBoost(XGB), Gradient Boosting Classifier(GBC) and Artificial Neural Network(ANN) to build up the expectation models utilizing a huge dataset (1429 individual's survey), bringing about precise and productive dynamics. By using various strategies and different model, this research work has attempted to get a clear and precise picture. The reason to follow various approaches is that, precise the information, work in a better way and reduce the number of suicide case. The final outcome received was 87.38 percent, which was using Support Vector Machine (SVM).","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"462 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131920493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544678
Xiaojing Zhu
A Weibo recommendation algorithm integrating user interests is studied in this manuscript. Among the algorithms based on content similarity recommendation, the LDA algorithm is one of the most used and classic algorithms. Therefore, this paper uses the LDA algorithm to mine the user interest distribution and uses the cosine similarity algorithm to calculate the similarity between the general microblog to be recommended and the user's interest. The proposed algorithm is designed by considering the similarity of user interest based on the semantic level and the similarity of the social relationship based on the follow relationship are then considered, a better recommendation effect can be achieved. To validate the model, the proposed algorithm is simulated on the data collected from the Weibo. The accuracy is higher than before.
{"title":"A Weibo Recommendation Algorithm Integrating User Interests","authors":"Xiaojing Zhu","doi":"10.1109/ICIRCA51532.2021.9544678","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544678","url":null,"abstract":"A Weibo recommendation algorithm integrating user interests is studied in this manuscript. Among the algorithms based on content similarity recommendation, the LDA algorithm is one of the most used and classic algorithms. Therefore, this paper uses the LDA algorithm to mine the user interest distribution and uses the cosine similarity algorithm to calculate the similarity between the general microblog to be recommended and the user's interest. The proposed algorithm is designed by considering the similarity of user interest based on the semantic level and the similarity of the social relationship based on the follow relationship are then considered, a better recommendation effect can be achieved. To validate the model, the proposed algorithm is simulated on the data collected from the Weibo. The accuracy is higher than before.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129236287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544519
Himanshu V Vairagade, Vivek Gurve, Neema Ukani, Sandeep R Sonaskar, S. Chakole
Parallel Manipulator is one of the trending research topics in the field of robotics. Recently, the 3-RPS parallel manipulator is widely being used for novel applications. Conventionally, the prismatic actuation is implemented using pneumatic drives. In this paper, a rack and pinion mechanism for prismatic link actuation is proposed. Three different modes of operations and two methods for controls are proposed. To validate the kinematic analysis of this configuration a MATLAB model is developed. To compare the numerical and experimental micro-manipulations two test cases are designed and results are compared.
{"title":"Design and Fabrication of 3-RPS Robot - Rack and Pinion Mechanism","authors":"Himanshu V Vairagade, Vivek Gurve, Neema Ukani, Sandeep R Sonaskar, S. Chakole","doi":"10.1109/ICIRCA51532.2021.9544519","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544519","url":null,"abstract":"Parallel Manipulator is one of the trending research topics in the field of robotics. Recently, the 3-RPS parallel manipulator is widely being used for novel applications. Conventionally, the prismatic actuation is implemented using pneumatic drives. In this paper, a rack and pinion mechanism for prismatic link actuation is proposed. Three different modes of operations and two methods for controls are proposed. To validate the kinematic analysis of this configuration a MATLAB model is developed. To compare the numerical and experimental micro-manipulations two test cases are designed and results are compared.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116892054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544959
Md. Asraful Haque, N. Ahmad
SRGMs (Software Reliability Growth Models) are the probabilistic and statistical models widely used to evaluate software reliability. They explain how the reliability of the software varies over time by investigating failure data as the testing progresses. The paper presents a new SRGM in an imperfect debugging environment. The proposed model considers that with time, the fault detection rate will increase gradually. Also, the new model is tested with a real dataset that is available in public domain and compared the results with seven existing models in terms of four goodness-of-fit criteria.
{"title":"An Imperfect SRGM based on NHPP","authors":"Md. Asraful Haque, N. Ahmad","doi":"10.1109/ICIRCA51532.2021.9544959","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544959","url":null,"abstract":"SRGMs (Software Reliability Growth Models) are the probabilistic and statistical models widely used to evaluate software reliability. They explain how the reliability of the software varies over time by investigating failure data as the testing progresses. The paper presents a new SRGM in an imperfect debugging environment. The proposed model considers that with time, the fault detection rate will increase gradually. Also, the new model is tested with a real dataset that is available in public domain and compared the results with seven existing models in terms of four goodness-of-fit criteria.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116949142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544775
Ch. V. Bhargavi, G. Mani, Naresh Cherukuri, C. Prasad, Azmira Krishna, C. Z. Basha
Covid-19 virus has changed the total life style of human beings. This coivd-19 started in the country china and spread all over the world. World health organization (WHO) suggested the face masks to be covered which can reduce the spread of corona virus. All countries made it compulsory to wear masks to cut-off the covid spread. Hence detection of wearing masks or not has become an important area to work on for computer vision. Many woks are being done on face mask detection, but mostly basis on the classification of mask and no-mask. Here in this paper. a novel approach is proposed which not only classifies mask and no-mask people, but also identifies whether a mask is properly covered or not. Thus in this paper use of R-CNN (Convolution Neural Network) is proposed which results to achieve an accuracy up to 0.93.
{"title":"A Novel Framework for Facemask Detection Using R-Convolution Neural Network","authors":"Ch. V. Bhargavi, G. Mani, Naresh Cherukuri, C. Prasad, Azmira Krishna, C. Z. Basha","doi":"10.1109/ICIRCA51532.2021.9544775","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544775","url":null,"abstract":"Covid-19 virus has changed the total life style of human beings. This coivd-19 started in the country china and spread all over the world. World health organization (WHO) suggested the face masks to be covered which can reduce the spread of corona virus. All countries made it compulsory to wear masks to cut-off the covid spread. Hence detection of wearing masks or not has become an important area to work on for computer vision. Many woks are being done on face mask detection, but mostly basis on the classification of mask and no-mask. Here in this paper. a novel approach is proposed which not only classifies mask and no-mask people, but also identifies whether a mask is properly covered or not. Thus in this paper use of R-CNN (Convolution Neural Network) is proposed which results to achieve an accuracy up to 0.93.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"640 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116086592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544920
B. Babu, Poojitha Tatineni, L. I, C. Prasad, Hema Chindu, Bala Bhaskara Rao Emani
This research work introduces a novel Decentralized Query Protocol called “The Graph” for indexing and caching data from blockchain and other such storage networks. This research work describes the query interface, topology of P2P network, economic incentives and mechanisms that are designed to keep the network running as a public utility. This research work will probably deliver “The Graph” across three significant improvement achievements. The primary delivery will be a free help that any dApp engineer can enlist to utilize. It will incorporate stable interfaces for characterizing the Schema, enrolling Mappings, and questioning with GraphQL. Dispatching first as a brought together help will permit us to emphasize on the plan, execution, and financial motivations at a quicker rate. The subsequent achievement will be the dispatch of the full P2P network. After this delivery, anybody will actually want to run a Graph Node and acquire Graph Tokens for taking part in the organization. This is the stage at which the Query Marketplace just as the Indexing and Caching Marketplace will be opened. The third significant delivery will incorporate help for Private Data. Private Data is secured on-chain however scrambled and constrained by clients.
{"title":"The Graph - A Decentralized Query Protocol for Block chain Technology","authors":"B. Babu, Poojitha Tatineni, L. I, C. Prasad, Hema Chindu, Bala Bhaskara Rao Emani","doi":"10.1109/ICIRCA51532.2021.9544920","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544920","url":null,"abstract":"This research work introduces a novel Decentralized Query Protocol called “The Graph” for indexing and caching data from blockchain and other such storage networks. This research work describes the query interface, topology of P2P network, economic incentives and mechanisms that are designed to keep the network running as a public utility. This research work will probably deliver “The Graph” across three significant improvement achievements. The primary delivery will be a free help that any dApp engineer can enlist to utilize. It will incorporate stable interfaces for characterizing the Schema, enrolling Mappings, and questioning with GraphQL. Dispatching first as a brought together help will permit us to emphasize on the plan, execution, and financial motivations at a quicker rate. The subsequent achievement will be the dispatch of the full P2P network. After this delivery, anybody will actually want to run a Graph Node and acquire Graph Tokens for taking part in the organization. This is the stage at which the Query Marketplace just as the Indexing and Caching Marketplace will be opened. The third significant delivery will incorporate help for Private Data. Private Data is secured on-chain however scrambled and constrained by clients.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544895
G. C. Kumar, D. Prasad, V. Rao, N. Sai
The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.
{"title":"Utilization of Nominal Group Technique for Cloud Computing Risk Assessment and Evaluation in Healthcare","authors":"G. C. Kumar, D. Prasad, V. Rao, N. Sai","doi":"10.1109/ICIRCA51532.2021.9544895","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544895","url":null,"abstract":"The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116179936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544810
G. Gupta, M. Pavan, K. S. Ruthwik, M. Revanth, A. T
Our globe is being impacted by a variety of calamities, some of which are natural and others which are manmade. The past decades have witnessed the occurrence of many types of natural and man-made disasters like Earthquakes, Tsunamis, Wildfires, EBOLA outbreak and currently COVID-19. These disasters have been claiming a lot of lives and in fact the number is very huge. Some lives could be saved if there is a better and faster aid in terms of help or immediate response from the officials or people nearby. Natural disasters cannot be controlled by humans but the number of deaths in other types of disasters could be controlled by us. Mainly, due to EBOLA and COVID-19 many people lost their lives because of lack of immediate support and aid. More than 10,000 deaths were accounted for by the EBOLA outbreak and now due to COVID-19, one of the most destructive viruses that ever lived on the earth, recorded figures much higher than that of EBOLA, nearly 3.17 million people left this world as of now. Now in this pandemic situation many are losing their lives because of the scarcity in medical equipment and also no proper transportation especially ambulance service. To overcome this situation this application supports the person who needs help by sending emergency alerts to the surrounding people for seeking help. This SOS application is capable of saving many lives through which an immediate aid and support can be obtained from the nearby people.
{"title":"A proximity aware android SOS application in times of pandemic","authors":"G. Gupta, M. Pavan, K. S. Ruthwik, M. Revanth, A. T","doi":"10.1109/ICIRCA51532.2021.9544810","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544810","url":null,"abstract":"Our globe is being impacted by a variety of calamities, some of which are natural and others which are manmade. The past decades have witnessed the occurrence of many types of natural and man-made disasters like Earthquakes, Tsunamis, Wildfires, EBOLA outbreak and currently COVID-19. These disasters have been claiming a lot of lives and in fact the number is very huge. Some lives could be saved if there is a better and faster aid in terms of help or immediate response from the officials or people nearby. Natural disasters cannot be controlled by humans but the number of deaths in other types of disasters could be controlled by us. Mainly, due to EBOLA and COVID-19 many people lost their lives because of lack of immediate support and aid. More than 10,000 deaths were accounted for by the EBOLA outbreak and now due to COVID-19, one of the most destructive viruses that ever lived on the earth, recorded figures much higher than that of EBOLA, nearly 3.17 million people left this world as of now. Now in this pandemic situation many are losing their lives because of the scarcity in medical equipment and also no proper transportation especially ambulance service. To overcome this situation this application supports the person who needs help by sending emergency alerts to the surrounding people for seeking help. This SOS application is capable of saving many lives through which an immediate aid and support can be obtained from the nearby people.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544516
Bhavani H N, R. V, P. K. Namboori
Colorectal cancer is a type of cancer which affects colon and rectum and it is one among the prominent cause of mortality due to cancer. Drugs are developed to cure colorectal cancer after rigorous process of clinical trials, but efficiency of drug or survival rate remains low. Analysis of interactions between proteins and drugs through network study helps in discovering uncovered interaction between proteins in a pathway. Colorectal cancer can affect the digestive tract lower end can begin with non-cancerous polyps with no symptoms, but these polyps can be detected by screening. The symptoms may vary from person to person depends upon the location of cancer, some may affect with irregular bowel habits, blood in stool, and abdominal irritation. The treatment of cancer also banks on the location of cancer which includes removal of tumor, surgery or radiation and chemotherapy. Proposed approach describes about cytoscape analysis in the genes. Analysis explores the inhibition of protein present in the TGB which can prevent the tumor in the network.
{"title":"Analysis of the role of Transforming Growth Factor Beta (TGF-B) Receptors in Colorectal Cancer (CRC)-A bio-molecular networking approach","authors":"Bhavani H N, R. V, P. K. Namboori","doi":"10.1109/ICIRCA51532.2021.9544516","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544516","url":null,"abstract":"Colorectal cancer is a type of cancer which affects colon and rectum and it is one among the prominent cause of mortality due to cancer. Drugs are developed to cure colorectal cancer after rigorous process of clinical trials, but efficiency of drug or survival rate remains low. Analysis of interactions between proteins and drugs through network study helps in discovering uncovered interaction between proteins in a pathway. Colorectal cancer can affect the digestive tract lower end can begin with non-cancerous polyps with no symptoms, but these polyps can be detected by screening. The symptoms may vary from person to person depends upon the location of cancer, some may affect with irregular bowel habits, blood in stool, and abdominal irritation. The treatment of cancer also banks on the location of cancer which includes removal of tumor, surgery or radiation and chemotherapy. Proposed approach describes about cytoscape analysis in the genes. Analysis explores the inhibition of protein present in the TGB which can prevent the tumor in the network.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}